Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
This paper proposes an intermediate solution using artificial intelligence to monitor any potential threat for SME, specifically in Malaysia. The proposed method uses Autoencoder based Deep Neural Network (AEDNN) trained with NSL-KDD dataset to efficiently detect possible cyber threats. This paper p...
| Main Authors: | Khaizuran Aqhar, Ubaidillah, Syifak Izhar, Hisham, Ferda, Ernawan, Badshah, Gran, Suharto, Edy |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/42366/ http://umpir.ump.edu.my/id/eprint/42366/1/Intrusion%20detection%20system%20using%20autoencoder%20based.pdf http://umpir.ump.edu.my/id/eprint/42366/2/Intrusion%20detection%20system%20using%20autoencoder%20based%20deep%20neural%20network%20for%20SME%20cybersecurity_ABS.pdf |
Similar Items
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023)
by: Shakirah, Saidin, et al.
Published: (2023)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Abnormal Event Detection in Surveillance Videos Using Spatiotemporal Autoencoder
by: Chong, Yong Shean
Published: (2019)
by: Chong, Yong Shean
Published: (2019)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Real-time human action recognition using stacked sparse autoencoders
by: Farooq, Adnan, et al.
Published: (2018)
by: Farooq, Adnan, et al.
Published: (2018)
Reconstruction of handwritten digit images using autoencoder neural networks
by: C. C., Tan, et al.
Published: (2008)
by: C. C., Tan, et al.
Published: (2008)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Product recommendation using deep learning in computer vision
by: Mogan, Sharvinteraan Carberry, et al.
Published: (2023)
by: Mogan, Sharvinteraan Carberry, et al.
Published: (2023)
Deep learning method based for breast cancer classification
by: Irmawati, Irmawati, et al.
Published: (2023)
by: Irmawati, Irmawati, et al.
Published: (2023)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Trends in IoT intrusion detection: A bibliometric analysis of deep learning approaches
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
by: Amir Muhammad Hafiz, Othman, et al.
Published: (2025)
Deep Learning-Based Technique for Sign Language Detection
by: Zuriani, Mustaffa, et al.
Published: (2023)
by: Zuriani, Mustaffa, et al.
Published: (2023)
Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
by: Fatokun Faith , Boluwatife
Published: (2020)
by: Fatokun Faith , Boluwatife
Published: (2020)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey
by: Islam, Md. Shohidul, et al.
Published: (2024)
by: Islam, Md. Shohidul, et al.
Published: (2024)
Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
by: Ernawan, Ferda
Published: (2019)
by: Ernawan, Ferda
Published: (2019)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
A New Psychovisual Threshold Technique in Image Processing Applications
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
by: Noor Hayani , Abd Rahim
Published: (2017)
by: Noor Hayani , Abd Rahim
Published: (2017)
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
by: Afrig, Aminuddin, et al.
Published: (2023)
by: Afrig, Aminuddin, et al.
Published: (2023)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Autoencoder Neural Networks: A Performance Study Based On Image Recognition, Reconstruction And Compression
by: Tan, Chun Chet
Published: (2008)
by: Tan, Chun Chet
Published: (2008)
Real time vein visualization using near-infrared imaging
by: May, Y. H., et al.
Published: (2020)
by: May, Y. H., et al.
Published: (2020)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
by: Ariatmanto, Dhani, et al.
Published: (2020)
by: Ariatmanto, Dhani, et al.
Published: (2020)
An improved robust image watermarking by using different embedding strengths
by: Ernawan, Ferda, et al.
Published: (2020)
by: Ernawan, Ferda, et al.
Published: (2020)
Frames selection based on modified entropy and object motion in video steganography
by: Muhammad, Fuad, et al.
Published: (2019)
by: Muhammad, Fuad, et al.
Published: (2019)
An efficient adaptive scaling factor for 4×4 DCT image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
A recent survey on image watermarking using scaling factor techniques for copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Similar Items
-
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023) -
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013) -
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013) -
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013) -
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)